Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Cho, Tae-Ho
- Prevention Method of False Report Generation in Cluster Heads for Dynamic En-Route Filtering of Wireless Sensor Networks
Abstract Views :243 |
PDF Views:122
Authors
Jung-Sub Ahn
1,
Tae-Ho Cho
2
Affiliations
1 College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, KP
2 College of Software Platform, Sungkyunkwan University, Suwon 16419, KP
1 College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, KP
2 College of Software Platform, Sungkyunkwan University, Suwon 16419, KP
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 9, No 3 (2017), Pagination: 63-70Abstract
Wireless sensor networks collect data through collaborative communication between sensor nodes. sensor nodes of wireless sensor networks are deployed in open environments. Hence, an attacker can easily compromise the node. An attacker can compromise a node to generate false reports and inject into the network. This causes unnecessary energy consumption in the process of transmitting false alarm messages and false data reports to the system. If the attacker keeps repeatedly attacking thereby causing problems such as reduction in the entire network life or disabling the networks. Yu and Guan proposed a dynamic en-route filtering scheme to detect and drop these false reports before reaching to the Base station. In the dynamic en-route filtering, the energy waste of the intermediate nodes occurs until it is detected early. In this paper, we propose a method to save the energy of the intermediate nodes by searching for the compromised node and blocking the reports generated at that node. When verifying a false report at the verification node, it can know report information. The base station is able to find the cluster of compromised nodes using that information. In particular, the base station can know the location of the node that has been compromised, we can block false alarms and energy losses by blocking reports generated in that cluster.Keywords
Network Simulation, Wireless Sensor Network, Dynamic En-Route Filtering, False Report Injection Attack.References
- Reejamol, K. J., and P. Dhanya Raj. "Hole handling techniques in wireless sensor networks: A survey." Computational Intelligence and Computing Research (ICCIC), 2016 IEEE International Conference on. IEEE, (2016)
- Nam, Su Man, and Tae Ho Cho. "A fuzzy rule-based path configuration method for LEAP in sensor networks." Ad Hoc Networks 31 (2015)
- H. Park and T. H. Cho. Partial path selection method in each subregion for routing path optimization in SEF based sensor networks. Journal of Korean Institute of Intelligent Systems 22(1), pp. 108-113. (2012)
- Mansouri, Djamel, et al. "Detecting DoS attacks in WSN based on clustering technique." 2013 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, (2013)
- Winkler, Thomas, and Bernhard Rinner. "Security and privacy protection in visual sensor networks: A survey." ACM Computing Surveys (CSUR) 47.1 (2014)
- F. Ye, H. Luo, S. Lu and L. Zhang, "Statistical en-route filtering of injected false data in sensor networks," Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 839-850, (2005)
- Lu, Rongxing, et al. "BECAN: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks." IEEE transactions on parallel and distributed systems 23.1 (2012)
- Li, Feng, and Jie Wu. "A probabilistic voting-based filtering scheme in wireless sensor networks." Proceedings of the 2006 international conference on Wireless communications and mobile computing. ACM, (2006)
- Yu, Zhen, and Yong Guan. "A dynamic en-route filtering scheme for data reporting in wireless sensor networks." IEEE/ACM Transactions on Networking (ToN) 18.1 (2010)
- Yang, Hao, and Songwu Lu. "Commutative cipher based en-route filtering in wireless sensor networks." Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th. Vol. 2. IEEE, (2004)
- Gupta, Pallavi, Vinay Prakash, and Preetam Suman. "Noticeable key points and issues of sensor deployment for large area Wireless Sensor Network: A survey." System Modeling & Advancement in Research Trends (SMART), International Conference. IEEE, (2016).
- Mohammed, Fihri, et al. "Investigating the impact of black-hole attack on hierarchical protocols and direct transmission in WSN." Proceedings of the International Conference on Internet of things and Cloud Computing. ACM, (2016)
- Joshi, Jetendra, et al. "SEED: Secure and energy efficient data transmission in Wireless Sensor Networks." Information and Communication Technology (ICoICT), 2016 4th International Conference on. IEEE, (2016)
- Saghar, Kashif, et al. "RAEED: A formally verified solution to resolve sinkhole attack in Wireless Sensor Network." Applied Sciences and Technology (IBCAST), 2016 13th International Bhurban Conference on. IEEE, (2016)
- Wang, Ding, and Ping Wang. "Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks." Ad Hoc Networks 20 (2014)
- Kumar, Vikash, Anshu Jain, and P. N. Barwal. "Wireless sensor networks: security issues, challenges and solutions." International Journal of Information and Computation Technology (IJICT) 4.8 (2014)
- Hwang, Ren Junn, and Yan Zhi Huang. "Secure Data Collection Scheme for Wireless Sensor Networks." Advanced Information Networking and Applications Workshops (WAINA), 2017 31st International Conference on. IEEE, (2017)
- WSN Lifetime Extension Using GA Optimised Fuzzy Logic
Abstract Views :208 |
PDF Views:98
Authors
Sang-Hyeok Lim
1,
Tae-Ho Cho
2
Affiliations
1 College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, KP
2 College of Software Platform, Sungkyunkwan University, Suwon 16419, KP
1 College of Information and Communication Engineering, Sungkyunkwan University, Suwon 16419, KP
2 College of Software Platform, Sungkyunkwan University, Suwon 16419, KP
Source
AIRCC's International Journal of Computer Science and Information Technology, Vol 9, No 5 (2017), Pagination: 1-14Abstract
A wireless sensor network (WSN) consists of multiple sensor nodes and base stations that collect information from widely deployed sensors. However, the disadvantage is that WSNs are randomly distributed in an open environment, which makes them difficult to manage individually and more easily found and compromised by an attacker. An attacker can execute a false report insertion or invalid vote insertion attack through a compromised node. The Probabilistic Voting Filtering System (PVFS) is a system that prevents these two types of attacks. Before sending a report, the proposed method probabilistically selects a validation node, determines the validity of the report, and filters the report based on the thresholds that have been set. In this paper, the proposed scheme improves the lifetime, detection rate, and report delivery rate of the entire network by increasing the lifetime of the cluster head (CH) by selecting the numbers of message authentication codes (MACs) and verification nodes of the report. Using this system, the event detection rate and the network lifetime are improved by up to 18% and 6%, respectively, relative to the existing PVFS.Keywords
Wireless Sensor Networks, False Report Injection Attack, False Vote Injection Attack, Secure Routing, Fuzzy System, Genetic Algorithm, Interactive Authentication.References
- Perrig, Adrian, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47.6 (2004): 53-57
- Zhang, Wensheng, and Guohong Cao. "Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach." INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE. Vol. 1. IEEE, 2005
- Al-Karaki, Jamal N., and Ahmed E. Kamal. "Routing techniques in wireless sensor networks: a survey." IEEE wireless communications 11.6 (2004): 6-28.
- Perrig, Adrian, John Stankovic, and David Wagner. "Security in wireless sensor networks." Communications of the ACM 47.6
- Li, Feng, and Jie Wu. "A probabilistic voting-based filtering scheme in wireless sensor networks." Proceedings of the 2006 international conference on Wireless communications and mobile computing.ACM, 2006
- Zadeh, Lotfi A. "Fuzzy sets." Information and control 8.3 (1965): 338-353
- J. Yen and R. Langari, Fuzzy Logic: Intelligence, Control, and Information. Prentice-Hall, Inc., 1998
- G. Klir and B. Yuan, Fuzzy Sets and Fuzzy Logic. Prentice hall New Jersey, 1995
- R. Babuška, "Fuzzy Systems, Modeling and Identification," Delft University of Technology, Department of Electrical Engineering Control Laboratory, Mekelweg, vol. 4, 1996.
- C. L. Karr, "Design of an adaptive fuzzy logic controller using a genetic algorithm." in Icga, 1991, pp.
- -457.
- C. L. Karr and E. J. Gentry, "Fuzzy control of pH using genetic algorithms," Fuzzy Systems, IEEE Transactions On, vol. 1, pp. 46, 1993.
- D. E. Golberg, "Genetic algorithms in search, optimization, and machine learning," Addion Wesley, vol. 1989, 1989.
- Y. Yuan and H. Zhuang, "A genetic algorithm for generating fuzzy classification rules," Fuzzy Sets Syst., vol. 84, pp. 1-19, 1996.
- J. J. Buckley and Y. Hayashi, "Fuzzy genetic algorithm and applications," Fuzzy Sets Syst., vol. 61, pp. 129-136, 1994.
- A. Geyer-Schulz, Fuzzy Rule-Based Expert Systems and Genetic Machine Learning. Physica Verlag, 1997
- Wormhole Detection Using Encrypted Node IDs and Hop Counts in the Event Report of Statistical En-Route Filtering
Abstract Views :280 |
PDF Views:2
Authors
Ga-Hyeon An
1,
Tae-Ho Cho
2
Affiliations
1 Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, KR
2 Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, KR
1 Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon, KR
2 Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, KR
Source
International Journal of Computer Networks and Applications, Vol 8, No 4 (2021), Pagination: 390-399Abstract
Wireless Sensor Network (WSN), there are low capacity, low cost, tiny sensor nodes, and sinks. Sensor nodes detect an event occurring in its surroundings and send data about the event to the sink. Sensor nodes have a limited transmission range and computational power. Since the wireless sensor network operates with limited resources than the ad hoc network, it is difficult to apply the defense method as it is, so research on a new defense method is needed. In a WSN, sensor nodes manage, monitor, and collect data for a specific environmental and physical application, and the collected data is transmitted to and used by a base station. Base stations are connected via the Internet and share data with users. Since the sensor node is composed of low power and low capacity, it is mainly used in an unattended environment, so it is easily exposed to various attacks and can be damaged. This type of network makes it difficult to detect wormhole attacks when they occur along with other attacks like false report injection attacks and Sybil attacks. Therefore, to prevent this, in this study, the hop count and the encrypted node ID are added in the report generation process of the statistical en-route filtering technique to detect wormhole attacks even when a wormhole attack occurs along with a false report injection attack to improve security.Keywords
Wormhole Attack, Statistical En-Route Filtering, Wireless Sensor Network, Hop Counts, Encrypted Node IDs.References
- I. F. Akyildiz, Weilian Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," in IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002, doi: 10.1109/MCOM.2002.1024422.
- Kumar, A., Pais, A.R. En-Route Filtering Techniques in Wireless Sensor Networks: A Survey. Wireless Pers Commun 96, 697–739 (2017).
- Tubaishat, Malik, and Sanjay Madria. "Sensor networks: an overview." IEEE potentials 22.2 (2003): 20-23.
- C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003., 2003, pp. 113-127, doi: 10.1109/SNPA.2003.1203362.
- Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang, "Statistical en-route filtering of injected false data in sensor networks," IEEE INFOCOM 2004, 2004, pp. 2446-2457 vol.4, doi: 10.1109/INFCOM.2004.1354666.
- Sastry, Anitha S., Shazia Sulthana, and S. Vagdevi. "Security threats in wireless sensor networks in each layer." International Journal of Advanced Networking and Applications 4.4 (2013): 1657.
- S. Kaplantzis, A. Shilton, N. Mani and Y. A. Sekercioglu, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines," 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, 2007, pp. 335-340, doi: 10.1109/ISSNIP.2007.4496866.
- J. Newsome, E. Shi, D. Song and A. Perrig, "The Sybil attack in sensor networks: analysis & defenses," Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004, 2004, pp. 259-268, doi: 10.1109/IPSN.2004.239019.
- Jindal, Keshav, Surjeet Dalal, and Kamal Kumar Sharma. "Analyzing spoofing attacks in wireless networks." 2014 Fourth International Conference on Advanced Computing & Communication Technologies. IEEE, 2014.
- Wazid, Mohammad, et al. "Detection and prevention mechanism for blackhole attack in wireless sensor network." 2013 International Conference on Communication and Signal Processing. IEEE, 2013.
- Walters, John Paul, et al. "Wireless sensor network security: A survey." Security in distributed, grid, mobile, and pervasive computing. Auerbach Publications, 2007. 367-409.
- Carman, David W., Peter S. Kruus, and Brian J. Matt. "Constraints and approaches for distributed sensor network security (final)." DARPA Project report,(Cryptographic Technologies Group, Trusted Information System, NAI Labs) 1.1 (2000): 1-39.
- Dener, Murat. "Security analysis in wireless sensor networks." International Journal of Distributed Sensor Networks 10.10 (2014): 303501.
- Rehana, Jinat. "Security of wireless sensor network." Seminar on Internetworking. 2009.
- Jeba, S. Annlin, and B. Paramasivan. "False data injection attack and its countermeasures in wireless sensor networks." European Journal of Scientific Research 82.2 (2012): 248-257.
- Goyal, Minalini, and Maitreyee Dutta. "Intrusion Detection of Wormhole Attack in IoT: A Review." 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET). IEEE, 2018.
- Khan, Zubair Ahmed, and M. Hasan Islam. "Wormhole attack: A new detection technique." 2012 International Conference on Emerging Technologies. IEEE, 2012.
- Khandare, Pravin, Yogesh Sharma, and S. R. Sakhare. "Countermeasures for selective forwarding and wormhole attack in WSN." 2017 International Conference on Inventive Systems and Control (ICISC). IEEE, 2017.
- Maidamwar, Priya, and Nekita Chavhan. "Wormhole Attack in Wireless Sensor Network." (2012).
- Meghdadi, Majid, Suat Ozdemir, and Inan Güler. "A survey of wormhole-based attacks and their countermeasures in wireless sensor networks." IETE technical review 28.2 (2011): 89-102.
- Umashankar Ghugar, Jayaram Pradhan. (2019). A Review on Wormhole Attacks in Wireless Sensor Networks. International Journal of Information Communication Technology and Digital Convergence, 4(1), 32-45.
- L. Hu, D. Evans, Using Directional Antennas to Prevent Wormhole Attacks, 14 Proceedings of the 11th Network and Distr ibuted System Security Symposium, pp. (2003).
- Ghugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2.1 (2021): 33-42.
- Maidamwar, Priya, and Nekita Chavhan. "Wormhole Attack in Wireless Sensor Network." (2012).
- Y. C. Hu, A. Perrig, D. B. Johnson, Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks, inProc. of IEEE -INFOCOM, (2003 ), pp. 1976 -1986, vol.3
- Kim, Frank Stajano Hyoung Joong, and Jong-Suk Chae Seong-Dong Kim. "Ubiquitous Convergence Technology."
- I . Khalil, S. Bagchi, N . B. Shroff, LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multi hop Wireless Networks , Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN’05) .
- Amish, Parmar, and V. B. Vaghela. "Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol." Procedia computer science 79 (2016): 700-707.
- Yun JH., Kim IH., Lim JH., Seo SW. (2007) WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks. In: Stajano F., Kim H.J., Chae JS., Kim SD. (eds) Ubiquitous Convergence Technology. ICUCT 2006. Lecture Notes in Computer Science, vol 4412. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71789-8_21.